Escolar Documentos
Profissional Documentos
Cultura Documentos
Addressing Table
Private IP
Device Address Public IP Address Subnet Mask Site
209.165.201.3
FTP/Web Server 10.44.1.254 255.255.255.0 Metropolis Bank HQ
http://www.cisco.corp
Objectives
Part 1: Download the Client Files to Mike’s PC
Part 2: Download the Client Files from the Backup File Server to Mike’s PC
Part 3: Verify the Integrity of the Client Files using Hashing
Part 4: Verify the Integrity of Critical Files using HMAC
Background
In this activity, you will verify the integrity of multiple files using hashes to ensure files have not been
tampered with. If any files are suspected of being tampered with, they are to be sent to Sally’s PC for further
analysis. The IP addressing, network configuration, and service configurations are already complete. You will
use the client devices in the differing geographic regions to verify and transfer any suspect files.
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 4
Packet Tracer – Using File and Data Integrity Checks
Part 2: Download the Client Files from the Backup File Server to Mike’s PC
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 4
Packet Tracer – Using File and Data Integrity Checks
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 4
Packet Tracer – Using File and Data Integrity Checks
h. Open a web browser on your personal computer and browse to the website
http://www.freeformatter.com/hmac-generator.html
i. Click the whitespace and paste in the text document contents. Enter the secret key of cisco123. Make
sure the algorithm is set to SHA1. Click Compute HMAC.
What is the computed HMAC for the contents of the file?
1b319bc7ba0adc63f2af2cafdc59f5279d46dd33
How is using HMAC more secure than general hashing?
It is hashed based on a key
Part 2: Download the client files from the backup file Step 1 2
server to Mike’s PC Step 1 6
Part 3: Verify the integrity of the client files using hashing Step 1 5
Part 4: Verify the integrity of critical files using HMAC Step 1 5
Step 1 5
Step 2 5
Questions 30
Packet Tracer Score 70
Total Score 100
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 4